Search

Your search keyword '"Bhunia, Swarup"' showing total 878 results

Search Constraints

Start Over You searched for: Author "Bhunia, Swarup" Remove constraint Author: "Bhunia, Swarup"
878 results on '"Bhunia, Swarup"'

Search Results

1. Scalable and Programmable Look-Up Table based Neural Acceleration (LUT-NA) for Extreme Energy Efficiency

2. Fusion Intelligence: Confluence of Natural and Artificial Intelligence for Enhanced Problem-Solving Efficiency

3. LUNA-CIM: Lookup Table based Programmable Neural Processing in Memory

4. DIVAS: An LLM-based End-to-End Framework for SoC Security Analysis and Policy-based Protection

5. DiSPEL: Distributed Security Policy Enforcement for Bus-based SoC

6. Towards Model-Size Agnostic, Compute-Free, Memorization-based Inference of Deep Learning

7. Dual Image-Based Watermarking Scheme Using Interpolation

8. Automatic Hardware Trojan Insertion using Machine Learning

10. Hands-On Learning of Hardware and Systems Security

12. Software Variants for Hardware Trojan Detection and Resilience in COTS Processors

13. Third-Party Hardware IP Assurance against Trojans through Supervised Learning and Post-processing

14. Neural Storage: A New Paradigm of Elastic Memory

15. MeLPUF: Memory-in-Logic PUF Structures for Low-Overhead IC Authentication

16. Scalable Attack-Resistant Obfuscation of Logic Circuits

17. SIGNED: A Challenge-Response Based Interrogation Scheme for Simultaneous Watermarking and Trojan Detection

18. Leveraging Domain Knowledge using Machine Learning for Image Compression in Internet-of-Things

19. The Smart Mask: Active Closed-Loop Protection against Airborne Pathogens

20. Benchmarking at the Frontier of Hardware Security: Lessons from Logic Locking

21. An Automated Framework for Board-level Trojan Benchmarking

22. Low Power Unsupervised Anomaly Detection by Non-Parametric Modeling of Sensor Statistics

23. P2C2: Peer-to-Peer Car Charging

26. Using your ADC and Backend Capacitors to Authenticate for Free: (Virtually) Free from Database, Enrollment, and Excessive Area/Power Overhead

27. SAIL: Machine Learning Guided Structural Analysis Attack on Hardware Obfuscation

40. Using a comic book to engage students in a cryptology and cybersecurity curriculum

42. Introduction

Catalog

Books, media, physical & digital resources